Porsline Security & Risk Analysis

wordpress.org/plugins/porsline

Porsline | Build eye-catching forms, surveys & quizzes that everybody is willing to engage!

300 active installs v2.9 PHP 7.0+ WP 6.5+ Updated Dec 22, 2025
contact-us-formform-builderform-builder-pluginregister-formsignup-form
99
A · Safe
CVEs total1
Unpatched0
Last CVEOct 31, 2024
Safety Verdict

Is Porsline Safe to Use in 2026?

Generally Safe

Score 99/100

Porsline has a strong security track record. Known vulnerabilities have been patched promptly.

1 known CVELast CVE: Oct 31, 2024Updated 3mo ago
Risk Assessment

The Porsline plugin v2.9 exhibits a mixed security posture. On the positive side, it demonstrates good practices by utilizing prepared statements for all SQL queries and performing nonce and capability checks on its entry points. It also has no known critical or high severity vulnerabilities currently unpatched, and no bundled libraries which could introduce outdated dependencies.

However, significant concerns arise from the static analysis. The plugin exposes two AJAX handlers without any authentication checks, creating a substantial attack surface for unauthorized actions. Furthermore, taint analysis reveals two flows with unsanitized paths, though these are not classified as critical or high severity. The low percentage of properly escaped output (21%) indicates a risk of Cross-Site Scripting (XSS) vulnerabilities, which can be exploited to execute arbitrary JavaScript in the user's browser.

The plugin's vulnerability history, including a past medium severity SQL injection vulnerability, suggests a recurring need for robust input validation and sanitization. While there are no currently unpatched vulnerabilities, the existence of a past SQL injection highlights a potential area of weakness. Overall, while Porsline has some strong security foundations, the unprotected entry points and unsanitized paths present immediate risks that require attention.

Key Concerns

  • Unprotected AJAX handlers
  • Flows with unsanitized paths
  • Low percentage of properly escaped output
  • Past medium severity SQL Injection vulnerability
Vulnerabilities
1

Porsline Security Vulnerabilities

CVEs by Year

1 CVE in 2024
2024
Patched Has unpatched

Severity Breakdown

Medium
1

1 total CVE

CVE-2024-51620medium · 6.5Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Porsline <= 1.0.2 - Authenticated (Contributor+) SQL Injection

Oct 31, 2024 Patched in 1.1 (183d)
Code Analysis
Analyzed Mar 16, 2026

Porsline Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
57
15 escaped
Nonce Checks
2
Capability Checks
2
File Operations
1
External Requests
1
Bundled Libraries
0

Output Escaping

21% escaped72 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

3 flows2 with unsanitized paths
porsline_form_token (admin_menu.php:7)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
2 unprotected

Porsline Attack Surface

Entry Points3
Unprotected2

AJAX Handlers 2

authwp_ajax_prs_loadajax.php:2
authwp_ajax_prs_saveajax.php:12

Shortcodes 1

[porsline] shortcode.php:2
WordPress Hooks 6
actionadmin_menuadmin_menu.php:2
actionplugins_loadedinit.php:19
actionadmin_enqueue_scriptsinit.php:22
actionadmin_noticesinit.php:27
actionadmin_headinit.php:41
actionwp_footershortcode.php:42
Maintenance & Trust

Porsline Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 22, 2025
PHP min version7.0
Downloads8K

Community Trust

Rating98/100
Number of ratings9
Active installs300
Developer Profile

Porsline Developer Profile

porsline

1 plugin · 300 total installs

78
trust score
Avg Security Score
99/100
Avg Patch Time
183 days
View full developer profile
Detection Fingerprints

How We Detect Porsline

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Porsline